Tanium comments on actively exploited Google Chrome exploit

Tanium kommentiert aktiv ausgenutzten Google Chrome-Exploit

Chrome Update

Update-Need for action for version smaller 91.0.4472.114

Last Thursday, Google published a blog post in which the tech giant points out a critical loophole in its Chrome browser. In addition, Google confirms that the vulnerability is already actively exploited by hackers.

For users of the browser, this poses a significant risk, as this vulnerability can be exploited to compromise its system – and subsequently, under certain circumstances, the network in which it is located. All Chrome users should therefore check as soon as possible which version of the browser is installed on their devices. Should not this 91.0.4472.114 (or higher), there is an urgent need for action and the application should be updated as soon as possible.

The same goes for companies that use Chrome: you need to have an overview of what versions your browsers (and other applications) have to stay safe. Organizations ask themselves questions such as ” Are we affected?”and” Do we have to deal with this vulnerability?”and to answer them as quickly as possible requires a deep insight into their environment. This includes a central repository in which current information about the entire IT environment is stored. Here it is important not to have to wait days or even weeks until the software version of each installed application is known. Ideally, it only takes moments for this critical information to be available.

Once this is known, the next step is to distribute necessary software updates to all endpoints without overloading network traffic-regardless of your location or the quality of the Internet connection.

Stefan Molls, RVP, Risk and Security at Tanium

“For companies, the current vulnerability can be a good time to set their own benchmarks regarding their update practices,” gives Stefan Molls, RVP, Risk and Security at Tanium , remember. “Measure how quickly you can identify endpoints with Google Chrome and how quickly you can fix this vulnerability. You should also ask yourself how confident you are that the data is up-to-date and complete.“

Attackers are always looking for ways to compromise a target network. These include phishing emails, vulnerable servers with Internet access or, as in the current case, unpatched applications. With the right strategy, organizations can address these threats and ensure the security of their IT environments.

About Tanium

Tanium provides endpoint management and security solutions tailored to the world’s most demanding IT environments. A variety of the world’s largest and most successful companies rely on Tanium to make informed decisions, maximize efficiency, and mitigate threats. Tanium’s customers include nearly half of the Fortune 100 companies, leading retailers and financial institutions, and several sectors of the U.S. Armed Forces. Tanium has been included in the Forbes Cloud 100 list of the “Top 100 Private Companies in Cloud Computing” for five consecutive years. Tanium is ranked 4th in FORTUNE’s “Best Workplaces in Technology 2020” list. www.tanium.com and follow us on LinkedIn and Twitter

Ready to see us in action:

More To Explore

Enable registration in settings - general
Have any project in mind?

Contact us: